Skip to content
macOSFilesystemHigh

LaunchServices Quarantine Events

Per-user SQLite log of every file downloaded through a quarantine-aware application (Safari, Chrome, Mail, AirDrop) with source URL and user agent.

artifact_type: macos_quarantine_events

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Initial access — tracing a malicious download back to its URL
  • Phishing — matching email attachments to delivery channel
  • Supply-chain compromise — which app fetched the payload

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
mac_apt
APOLLO

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI